Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications

被引:13
作者
Hu, Guojie [1 ]
Si, Jiangbo [2 ]
Cai, Yunlong [3 ]
Zhu, Fengchao [1 ]
机构
[1] Rocket Force Univ Engn, Coll Commun Engn, Xian 710025, Peoples R China
[2] Xidian Univ, Integrated Serv Networks Lab, Xian 710100, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Peoples R China
关键词
Jamming; Eavesdropping; Unmanned aerial vehicles; Resource management; Gain; Surveillance; Signal to noise ratio; Wireless information surveillance; UAV; jamming; eavesdropping rate; multiuser communication;
D O I
10.1109/LWC.2021.3109037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to maximize its sum eavesdropping rate by overhearing the messages from the UAV and jamming the ground multiple suspicious users simultaneously (corresponding to DB), or vice versa (corresponding to UMA). However, as the jamming power of E varies, the suspicious UAV and users will adapt their deployment and power allocation patterns concurrently to maintain the benefits of the suspicious system, which will cause certain obstacles for E to grasp its accurate jamming effect. To tackle these challenges, we first fix the jamming behavior of E and accordingly figure out the adaptiveness of the suspicious system, armed with which we further exploit the step characteristic of the eavesdropping rate to determine the optimal (sub-optimal) jamming power of E, and the complexity involved only increases linearly with the number of suspicious users and thus avoiding the tedious exhaustive search. Simulations verify the effectiveness of the proposed schemes compared to conventional benchmarks.
引用
收藏
页码:3 / 7
页数:5
相关论文
共 14 条
[1]   All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems [J].
Ahmed, Elsayed ;
Eltawil, Ahmed M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (07) :3519-3532
[2]   Jamming-Assisted Eavesdropping Over Parallel Fading Channels [J].
Han, Yitao ;
Duan, Lingjie ;
Zhang, Rui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) :2486-2499
[3]   Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks [J].
Hu, Dingkun ;
Zhang, Qi ;
Yang, Ping ;
Qin, Jiayin .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) :1714-1718
[4]   Legitimate Eavesdropping in UAV-Based Relaying System [J].
Hu, Guojie ;
Cai, Yueming .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (10) :2275-2279
[5]   Legitimate Eavesdropping in Two-Way AF Relay Networks [J].
Hu, Guojie ;
Cai, Yueming .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (07) :995-999
[6]   Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems [J].
Lu, Haiquan ;
Zhang, Haiyang ;
Dai, Haibo ;
Wu, Wei ;
Wang, Baoyun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) :1993-1997
[7]   Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing [J].
Moon, Jihwan ;
Lee, Hoon ;
Song, Changick ;
Kang, Seowoo ;
Lee, Inkyu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (10) :6958-6971
[8]  
Sun L, IEEE T INF FORENSICS, V16, P2021
[9]  
Surhone L. M., 2010, QUARTIC FUNCTION
[10]   Spectrum Sharing Incentive for Legitimate Wireless Information Surveillance [J].
Xu, Ding ;
Zhu, Hongbo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (03) :2529-2543